Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 17, Issue 4 (2006)
  4. Adaptive Chosen Ciphertext Secure Thresh ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Related articles
  • Cited by
  • More
    Article info Related articles Cited by

Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
Volume 17, Issue 4 (2006), pp. 519–534
Yu Long   Kefei Chen   Shengli Liu  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2006.152
Pub. online: 1 January 2006      Type: Research Article     

Received
1 January 2006
Published
1 January 2006

Abstract

This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard.

Related articles Cited by PDF XML
Related articles Cited by PDF XML

Copyright
No copyright data available.

Keywords
threshold key escrow identity-based cryptography chosen-ciphertext attack pairing based cryptology

Metrics
since January 2020
822

Article info
views

0

Full article
views

502

PDF
downloads

201

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy